Sciweavers

1466 search results - page 208 / 294
» Completeness of the Authentication Tests
Sort
View
MFCS
2005
Springer
14 years 1 months ago
Complexity of DNF and Isomorphism of Monotone Formulas
We investigate the complexity of finding prime implicants and minimal equivalent DNFs for Boolean formulas, and of testing equivalence and isomorphism of monotone formulas. For DN...
Judy Goldsmith, Matthias Hagen, Martin Mundhenk
MICAI
2005
Springer
14 years 1 months ago
Analysis of Performance of Fuzzy Logic-Based Production Scheduling by Simulation
Abstract. In this paper, a new fuzzy logic-based approach to production scheduling in the presence of uncertain disruptions is presented. The approach is applied to a real-life pro...
Alejandra Duenas, Dobrila Petrovic, Sanja Petrovic
SEMWEB
2005
Springer
14 years 1 months ago
Combining RDF and Part of OWL with Rules: Semantics, Decidability, Complexity
This paper extends the model theory of RDF with rules, placing an emphasis on integration with OWL and decidability of entailstart from an abstract syntax that views a rule as a pa...
Herman J. ter Horst
SACMAT
2004
ACM
14 years 1 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
SIGUCCS
2004
ACM
14 years 1 months ago
Spam software evaluation, training, and support: fighting back to reclaim the email inbox
This paper explains two projects dealing with spam recently completed at Iowa State University (ISU). The first project was undertaken by a team composed of members of the campus ...
Jeff Balvanz, Don Paulsen, Joe Struss